VYPR
High severity8.1NVD Advisory· Published May 4, 2026· Updated May 6, 2026

CVE-2026-40563

CVE-2026-40563

Description

Description: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings. Attacker can alter Gremlin traversal logic within grammar-allowed characters to access unintended data

Affect Version: This issue affects Apache Atlas: from 0.8 through 2.4.0.

For the affect version >= 2.0, vulnerability is only when Atlas is deployed with below non-default configuration.

atlas.dsl.executor.traversal=false

Mitigation: Users are recommended to upgrade to version 2.5.0, which fixes the issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.atlas:apache-atlasMaven
>= 0.8, < 2.5.02.5.0

Affected products

1
  • cpe:2.3:a:apache:atlas:*:*:*:*:*:*:*:*
    Range: >=0.8,<2.5.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.